{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,5,18]],"date-time":"2023-05-18T17:18:53Z","timestamp":1684430333134},"publisher-location":"New York, NY, USA","reference-count":81,"publisher":"ACM","funder":[{"DOI":"10.13039\/100010667","name":"H2020 Industrial Leadership","doi-asserted-by":"publisher","award":["825333"]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3484557","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T17:05:34Z","timestamp":1636823134000},"update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Secure Multi-party Computation of Differentially Private Heavy Hitters"],"prefix":"10.1145","author":[{"given":"Jonas","family":"B\u00f6hler","sequence":"first","affiliation":[{"name":"SAP Security Research, Karlsruhe, Germany"}]},{"given":"Florian","family":"Kerschbaum","sequence":"additional","affiliation":[{"name":"University of Waterloo, Waterloo, Canada"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3226070"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24178-9_9"},{"key":"e_1_3_2_2_3_1","volume-title":"Secure Computation on Floating Point Numbers. In Network and Distributed Systems Security Symposium (NDSS).","author":"Aliasgari Mehrdad","year":"2013","unstructured":"Mehrdad Aliasgari , Marina Blanton , Yihua Zhang , and Aaron Steele . 2013 . Secure Computation on Floating Point Numbers. In Network and Distributed Systems Security Symposium (NDSS). Mehrdad Aliasgari, Marina Blanton, Yihua Zhang, and Aaron Steele. 2013. Secure Computation on Floating Point Numbers. In Network and Distributed Systems Security Symposium (NDSS)."},{"key":"e_1_3_2_2_4_1","volume-title":"Smart, and Tim Wood","author":"Aly Abdelrahaman","year":"2020","unstructured":"Abdelrahaman Aly , Marcel Keller , Dragos Rotaru , Peter Scholl , Nigel P. Smart, and Tim Wood . 2020 . SCALE--MAMBA Documentation . https:\/\/homes.esat.kuleuven.be\/~nsmart\/SCALE\/. Abdelrahaman Aly, Marcel Keller, Dragos Rotaru, Peter Scholl, Nigel P. Smart, and Tim Wood. 2020. SCALE--MAMBA Documentation. https:\/\/homes.esat.kuleuven.be\/~nsmart\/SCALE\/."},{"key":"e_1_3_2_2_5_1","volume-title":"Benchmarking Privacy Preserving Scientific Operations. In International Conference on Applied Cryptography and Network Security (ACNS).","author":"Aly Abdelrahaman","year":"2019","unstructured":"Abdelrahaman Aly and Nigel P Smart . 2019 . Benchmarking Privacy Preserving Scientific Operations. In International Conference on Applied Cryptography and Network Security (ACNS). Abdelrahaman Aly and Nigel P Smart. 2019. Benchmarking Privacy Preserving Scientific Operations. In International Conference on Applied Cryptography and Network Security (ACNS)."},{"key":"e_1_3_2_2_6_1","unstructured":"Amazon.com. 2020. Amazon Web Services. https:\/\/aws.amazon.com\/ec2\/pricing\/on-demand\/. Amazon.com. 2020. Amazon Web Services. https:\/\/aws.amazon.com\/ec2\/pricing\/on-demand\/."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131407"},{"key":"e_1_3_2_2_8_1","volume-title":"WWDC 2016: Engineering Privacy for Your Users. Retrieved","year":"2016","unstructured":"Apple. 2016 . WWDC 2016: Engineering Privacy for Your Users. Retrieved October, 2020 from https:\/\/developer.apple.com\/videos\/play\/wwdc2016\/709\/ https:\/\/developer.apple.com\/videos\/play\/wwdc2016\/709\/. Apple. 2016. WWDC 2016: Engineering Privacy for Your Users. Retrieved October, 2020 from https:\/\/developer.apple.com\/videos\/play\/wwdc2016\/709\/ https:\/\/developer.apple.com\/videos\/play\/wwdc2016\/709\/."},{"key":"e_1_3_2_2_9_1","volume-title":"Differential privacy on finite computers. arXiv preprint arXiv:1709.05396","author":"Balcer Victor","year":"2017","unstructured":"Victor Balcer and Salil Vadhan . 2017. Differential privacy on finite computers. arXiv preprint arXiv:1709.05396 ( 2017 ). Victor Balcer and Salil Vadhan. 2017. Differential privacy on finite computers. arXiv preprint arXiv:1709.05396 (2017)."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417242"},{"key":"e_1_3_2_2_11_1","unstructured":"Raef Bassily Kobbi Nissim Uri Stemmer and Abhradeep Guha Thakurta. 2017. Practical locally private heavy hitters. In Advances in Neural Information Processing Systems (NeurIPS). Raef Bassily Kobbi Nissim Uri Stemmer and Abhradeep Guha Thakurta. 2017. Practical locally private heavy hitters. In Advances in Neural Information Processing Systems (NeurIPS)."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2746539.2746632"},{"key":"e_1_3_2_2_13_1","volume-title":"Annual International Cryptology Conference (CRYPTO).","author":"Beaver Donald","year":"1991","unstructured":"Donald Beaver . 1991 . Efficient multiparty protocols using circuit randomization . In Annual International Cryptology Conference (CRYPTO). Donald Beaver. 1991. Efficient multiparty protocols using circuit randomization. In Annual International Cryptology Conference (CRYPTO)."},{"key":"e_1_3_2_2_14_1","volume-title":"On the Round Complexity of the Shuffle Model. arXiv preprint arXiv:2009.13510","author":"Beimel Amos","year":"2020","unstructured":"Amos Beimel , Iftach Haitner , Kobbi Nissim , and Uri Stemmer . 2020. On the Round Complexity of the Shuffle Model. arXiv preprint arXiv:2009.13510 ( 2020 ). https:\/\/arxiv.org\/abs\/2009.13510 https:\/\/arxiv.org\/abs\/2009.13510. Amos Beimel, Iftach Haitner, Kobbi Nissim, and Uri Stemmer. 2020. On the Round Complexity of the Shuffle Model. arXiv preprint arXiv:2009.13510 (2020). https:\/\/arxiv.org\/abs\/2009.13510 https:\/\/arxiv.org\/abs\/2009.13510."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20465-4_11"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132769"},{"key":"e_1_3_2_2_17_1","volume-title":"Retrieved","author":"Blog Google Developers","year":"2019","unstructured":"Google Developers Blog . 2019 . Enabling developers and organizations to use differential privacy . Retrieved October, 2020 from https:\/\/developers.googleblog.com\/2019\/09\/enabling-developers-and-organizations.html https:\/\/developers.googleblog.com\/2019\/09\/enabling-developers-and-organizations.html. Google Developers Blog. 2019. Enabling developers and organizations to use differential privacy. Retrieved October, 2020 from https:\/\/developers.googleblog.com\/2019\/09\/enabling-developers-and-organizations.html https:\/\/developers.googleblog.com\/2019\/09\/enabling-developers-and-organizations.html."},{"key":"e_1_3_2_2_18_1","volume-title":"Secure Multi-party Computation of Differentially Private Median. In USENIX Security Symposium (USENIXSec).","author":"B\u00f6hler Jonas","year":"2020","unstructured":"Jonas B\u00f6hler and Florian Kerschbaum . 2020 . Secure Multi-party Computation of Differentially Private Median. In USENIX Security Symposium (USENIXSec). Jonas B\u00f6hler and Florian Kerschbaum. 2020. Secure Multi-party Computation of Differentially Private Median. In USENIX Security Symposium (USENIXSec)."},{"key":"e_1_3_2_2_19_1","volume-title":"Secure Sublinear Time Differentially Private Median Computation. In Network and Distributed Systems Security Symposium (NDSS).","author":"B\u00f6hler Jonas","year":"2020","unstructured":"Jonas B\u00f6hler and Florian Kerschbaum . 2020 . Secure Sublinear Time Differentially Private Median Computation. In Network and Distributed Systems Security Symposium (NDSS). Jonas B\u00f6hler and Florian Kerschbaum. 2020. Secure Sublinear Time Differentially Private Median Computation. In Network and Distributed Systems Security Symposium (NDSS)."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"crossref","unstructured":"Dan Boneh Elette Boyle Henry Corrigan-Gibbs Niv Gilboa and Yuval Ishai. 2021. Lightweight Techniques for Private Heavy Hitters. (2021). Dan Boneh Elette Boyle Henry Corrigan-Gibbs Niv Gilboa and Yuval Ishai. 2021. Lightweight Techniques for Private Heavy Hitters. (2021).","DOI":"10.1109\/SP40001.2021.00048"},{"key":"e_1_3_2_2_21_1","volume-title":"On the self-decomposability of the Fr\u00e9chet distribution. Indagationes Mathematicae","author":"Bosch Pierre","year":"2013","unstructured":"Pierre Bosch and Thomas Simon . 2013. On the self-decomposability of the Fr\u00e9chet distribution. Indagationes Mathematicae ( 2013 ). Pierre Bosch and Thomas Simon. 2013. On the self-decomposability of the Fr\u00e9chet distribution. Indagationes Mathematicae (2013)."},{"key":"e_1_3_2_2_22_1","volume-title":"Data Poisoning Attacks to Local Differential Privacy Protocols. arXiv preprint arXiv:1911.02046","author":"Cao Xiaoyu","year":"2019","unstructured":"Xiaoyu Cao , Jinyuan Jia , and Neil Zhenqiang Gong . 2019. Data Poisoning Attacks to Local Differential Privacy Protocols. arXiv preprint arXiv:1911.02046 ( 2019 ). https:\/\/arxiv.org\/abs\/1911.02046. Xiaoyu Cao, Jinyuan Jia, and Neil Zhenqiang Gong. 2019. Data Poisoning Attacks to Local Differential Privacy Protocols. arXiv preprint arXiv:1911.02046 (2019). https:\/\/arxiv.org\/abs\/1911.02046."},{"key":"e_1_3_2_2_23_1","volume-title":"European Symposium on Algorithms (ESA).","author":"Hubert Chan TH","year":"2012","unstructured":"TH Hubert Chan , Elaine Shi , and Dawn Song . 2012 . Optimal lower bound for differentially private multi-party aggregation . In European Symposium on Algorithms (ESA). TH Hubert Chan, Elaine Shi, and Dawn Song. 2012. Optimal lower bound for differentially private multi-party aggregation. In European Symposium on Algorithms (ESA)."},{"key":"e_1_3_2_2_24_1","volume-title":"Manipulation attacks in local differential privacy. arXiv preprint arXiv:1909.09630","author":"Cheu Albert","year":"2019","unstructured":"Albert Cheu , Adam Smith , and Jonathan Ullman . 2019. Manipulation attacks in local differential privacy. arXiv preprint arXiv:1909.09630 ( 2019 ). https:\/\/arxiv.org\/abs\/1909.09630. Albert Cheu, Adam Smith, and Jonathan Ullman. 2019. Manipulation attacks in local differential privacy. arXiv preprint arXiv:1909.09630 (2019). https:\/\/arxiv.org\/abs\/1909.09630."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17653-2_13"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0047"},{"key":"e_1_3_2_2_27_1","volume-title":"Methods for finding frequent items in data streams. The VLDB Journal","author":"Cormode Graham","year":"2010","unstructured":"Graham Cormode and Marios Hadjieleftheriou . 2010. Methods for finding frequent items in data streams. The VLDB Journal ( 2010 ). Graham Cormode and Marios Hadjieleftheriou. 2010. Methods for finding frequent items in data streams. The VLDB Journal (2010)."},{"key":"e_1_3_2_2_28_1","volume-title":"USENIX Symposium on Networked Systems Design and Implementation.","author":"Corrigan-Gibbs Henry","year":"2017","unstructured":"Henry Corrigan-Gibbs and Dan Boneh . 2017 . Prio: Private, robust, and scalable computation of aggregate statistics . USENIX Symposium on Networked Systems Design and Implementation. Henry Corrigan-Gibbs and Dan Boneh. 2017. Prio: Private, robust, and scalable computation of aggregate statistics. USENIX Symposium on Networked Systems Design and Implementation."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_38"},{"key":"e_1_3_2_2_30_1","unstructured":"Bolin Ding Janardhan Kulkarni and Sergey Yekhanin. 2017. Collecting Telemetry Data Privately. In Advances in Neural Information Processing Systems (NeurIPS). Bolin Ding Janardhan Kulkarni and Sergey Yekhanin. 2017. Collecting Telemetry Data Privately. In Advances in Neural Information Processing Systems (NeurIPS)."},{"key":"e_1_3_2_2_31_1","volume-title":"Optimal Differential Privacy Composition for Exponential Mechanisms. In International Conference on Machine Learning (ICML).","author":"Dong Jinshuo","year":"2020","unstructured":"Jinshuo Dong , David Durfee , and Ryan Rogers . 2020 . Optimal Differential Privacy Composition for Exponential Mechanisms. In International Conference on Machine Learning (ICML). Jinshuo Dong, David Durfee, and Ryan Rogers. 2020. Optimal Differential Privacy Composition for Exponential Mechanisms. In International Conference on Machine Learning (ICML)."},{"key":"e_1_3_2_2_32_1","volume-title":"Practical Differentially Private Top-k Selection with Pay-what-you-get Composition. arXiv preprint arXiv:1905.04273","author":"Durfee David","year":"2019","unstructured":"David Durfee and Ryan Rogers . 2019. Practical Differentially Private Top-k Selection with Pay-what-you-get Composition. arXiv preprint arXiv:1905.04273 ( 2019 ). ( Extended version). https:\/\/arxiv.org\/abs\/1905.04273. David Durfee and Ryan Rogers. 2019. Practical Differentially Private Top-k Selection with Pay-what-you-get Composition. arXiv preprint arXiv:1905.04273 (2019). (Extended version). https:\/\/arxiv.org\/abs\/1905.04273."},{"key":"e_1_3_2_2_33_1","unstructured":"David Durfee and Ryan Rogers. 2019. Practical Differentially Private Top-k Selection with Pay-what-you-get Composition. In Advances in Neural Information Processing Systems (NeurIPS). David Durfee and Ryan Rogers. 2019. Practical Differentially Private Top-k Selection with Pay-what-you-get Composition. In Advances in Neural Information Processing Systems (NeurIPS)."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"crossref","unstructured":"Cynthia Dwork. 2006. Differential Privacy. In International Colloquium on Automata Languages and Programming (ICALP). Cynthia Dwork. 2006. Differential Privacy. In International Colloquium on Automata Languages and Programming (ICALP).","DOI":"10.1007\/11787006_1"},{"key":"e_1_3_2_2_35_1","volume-title":"Ourselves: Privacy Via Distributed Noise Generation. In Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT).","author":"Dwork Cynthia","year":"2006","unstructured":"Cynthia Dwork , Krishnaram Kenthapadi , Frank McSherry , Ilya Mironov , and Moni Naor . 2006 . Our Data , Ourselves: Privacy Via Distributed Noise Generation. In Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT). Cynthia Dwork, Krishnaram Kenthapadi, Frank McSherry, Ilya Mironov, and Moni Naor. 2006. Our Data, Ourselves: Privacy Via Distributed Noise Generation. In Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT)."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_2_37_1","volume-title":"The algorithmic foundations of differential privacy. Foundations and Trends in Theoretical Computer Science","author":"Dwork Cynthia","year":"2014","unstructured":"Cynthia Dwork and Aaron Roth . 2014. The algorithmic foundations of differential privacy. Foundations and Trends in Theoretical Computer Science ( 2014 ). Cynthia Dwork and Aaron Roth. 2014. The algorithmic foundations of differential privacy. Foundations and Trends in Theoretical Computer Science (2014)."},{"key":"e_1_3_2_2_38_1","volume-title":"Private false discovery rate control. arXiv preprint arXiv:1511.03803","author":"Dwork Cynthia","year":"2015","unstructured":"Cynthia Dwork , Weijie Su , and Li Zhang . 2015. Private false discovery rate control. arXiv preprint arXiv:1511.03803 ( 2015 ). https:\/\/arxiv.org\/abs\/1511.03803. Cynthia Dwork, Weijie Su, and Li Zhang. 2015. Private false discovery rate control. arXiv preprint arXiv:1511.03803 (2015). https:\/\/arxiv.org\/abs\/1511.03803."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664263"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"crossref","unstructured":"David Evans Vladimir Kolesnikov Mike Rosulek etal 2018. A pragmatic introduction to secure multi-party computation. Foundations and Trends\u00aein Privacy and Security (2018). David Evans Vladimir Kolesnikov Mike Rosulek et al. 2018. A pragmatic introduction to secure multi-party computation. Foundations and Trends\u00aein Privacy and Security (2018).","DOI":"10.1561\/9781680835090"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0015"},{"key":"e_1_3_2_2_43_1","volume-title":"Building a RAPPOR with the unknown: Privacy-preserving learning of associations and data dictionaries. arXiv preprint arXiv:1503.01214","author":"Fanti Giulia","year":"2016","unstructured":"Giulia Fanti , Vasyl Pihur , and \u00dalfar Erlingsson . 2016. Building a RAPPOR with the unknown: Privacy-preserving learning of associations and data dictionaries. arXiv preprint arXiv:1503.01214 ( 2016 ). ( Extended Version) . https:\/\/arxiv.org\/pdf\/1503.01214.pdf. Giulia Fanti, Vasyl Pihur, and \u00dalfar Erlingsson. 2016. Building a RAPPOR with the unknown: Privacy-preserving learning of associations and data dictionaries. arXiv preprint arXiv:1503.01214 (2016). (Extended Version). https:\/\/arxiv.org\/pdf\/1503.01214.pdf."},{"key":"e_1_3_2_2_44_1","volume-title":"International Conference on Machine Learning (ICML).","author":"Ghazi Badih","year":"2020","unstructured":"Badih Ghazi , Ravi Kumar , Pasin Manurangsi , and Rasmus Pagh . 2020 . Private counting from anonymous messages: Near-optimal accuracy with vanishing communication overhead . In International Conference on Machine Learning (ICML). Badih Ghazi, Ravi Kumar, Pasin Manurangsi, and Rasmus Pagh. 2020. Private counting from anonymous messages: Near-optimal accuracy with vanishing communication overhead. In International Conference on Machine Learning (ICML)."},{"key":"e_1_3_2_2_45_1","volume-title":"Foundations of Cryptography","author":"Goldreich Oded","unstructured":"Oded Goldreich . 2009. Foundations of Cryptography : Volume 2 , Basic Applications . Oded Goldreich. 2009. Foundations of Cryptography: Volume 2, Basic Applications."},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/28395.28420"},{"key":"e_1_3_2_2_47_1","volume-title":"A comprehensive comparison of multi-party secure additions with differential privacy","author":"Goryczka Slawomir","year":"2017","unstructured":"Slawomir Goryczka and Li Xiong . 2017. A comprehensive comparison of multi-party secure additions with differential privacy . IEEE Transactions on Dependable and Secure Computing ( 2017 ). Slawomir Goryczka and Li Xiong. 2017. A comprehensive comparison of multi-party secure additions with differential privacy. IEEE Transactions on Dependable and Secure Computing (2017)."},{"key":"e_1_3_2_2_48_1","volume-title":"Mathematics for the Analysis of Algorithms","author":"Greene Daniel H","unstructured":"Daniel H Greene and Donald E Knuth . 2007. Mathematics for the Analysis of Algorithms . Springer Science & Business Media . Daniel H Greene and Donald E Knuth. 2007. Mathematics for the Analysis of Algorithms. Springer Science & Business Media."},{"key":"e_1_3_2_2_49_1","unstructured":"Mikko Heikkil\u00e4 Eemil Lagerspetz Samuel Kaski Kana Shimizu Sasu Tarkoma and Antti Honkela. 2017. Differentially private Bayesian learning on distributed data. In Advances in Neural Information Processing Systems (NeurIPS). Mikko Heikkil\u00e4 Eemil Lagerspetz Samuel Kaski Kana Shimizu Sasu Tarkoma and Antti Honkela. 2017. Differentially private Bayesian learning on distributed data. In Advances in Neural Information Processing Systems (NeurIPS)."},{"key":"e_1_3_2_2_50_1","unstructured":"Justin Hsu Sanjeev Khanna and Aaron Roth. 2012. Distributed private heavy hitters. In International Colloquium on Automata Languages and Programming (ICALP). Justin Hsu Sanjeev Khanna and Aaron Roth. 2012. Distributed private heavy hitters. In International Colloquium on Automata Languages and Programming (ICALP)."},{"key":"e_1_3_2_2_51_1","unstructured":"Bargav Jayaraman Lingxiao Wang David Evans and Quanquan Gu. 2018. Distributed learning without distress: Privacy-preserving empirical risk minimization. In Advances in Neural Information Processing Systems (NeurIPS). Bargav Jayaraman Lingxiao Wang David Evans and Quanquan Gu. 2018. Distributed learning without distress: Privacy-preserving empirical risk minimization. In Advances in Neural Information Processing Systems (NeurIPS)."},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"crossref","unstructured":"Shiva Prasad Kasiviswanathan Homin K Lee Kobbi Nissim Sofya Raskhodnikova and Adam Smith. 2011. What can we learn privately? SIAM J. Comput. (2011). Shiva Prasad Kasiviswanathan Homin K Lee Kobbi Nissim Sofya Raskhodnikova and Adam Smith. 2011. What can we learn privately? SIAM J. Comput. (2011).","DOI":"10.1137\/090756090"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417872"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78372-7_6"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98113-0_10"},{"key":"e_1_3_2_2_56_1","volume-title":"Differential Privacy: From Theory to Practice. Synthesis Lectures on Information Security, Privacy, & Trust","author":"Li Ninghui","year":"2016","unstructured":"Ninghui Li , Min Lyu , Dong Su , and Weining Yang . 2016 . Differential Privacy: From Theory to Practice. Synthesis Lectures on Information Security, Privacy, & Trust (2016). Ninghui Li, Min Lyu, Dong Su, and Weining Yang. 2016. Differential Privacy: From Theory to Practice. Synthesis Lectures on Information Security, Privacy, & Trust (2016)."},{"key":"e_1_3_2_2_57_1","volume-title":"A Proof of Security of Yao's Protocol for Two-Party Computation. Journal of Cryptology","author":"Lindell Yehuda","year":"2009","unstructured":"Yehuda Lindell and Benny Pinkas . 2009. A Proof of Security of Yao's Protocol for Two-Party Computation. Journal of Cryptology ( 2009 ). Yehuda Lindell and Benny Pinkas. 2009. A Proof of Security of Yao's Protocol for Two-Party Computation. Journal of Cryptology (2009)."},{"key":"e_1_3_2_2_58_1","volume-title":"Leveraging Public Data for Practical Private Query Release. arXiv preprint arXiv:2102.08598","author":"Liu Terrance","year":"2021","unstructured":"Terrance Liu , Giuseppe Vietri , Thomas Steinke , Jonathan Ullman , and Zhiwei Steven Wu. 2021. Leveraging Public Data for Practical Private Query Release. arXiv preprint arXiv:2102.08598 ( 2021 ). https:\/\/arxiv.org\/pdf\/2102.08598.pdf . Terrance Liu, Giuseppe Vietri, Thomas Steinke, Jonathan Ullman, and Zhiwei Steven Wu. 2021. Leveraging Public Data for Practical Private Query Release. arXiv preprint arXiv:2102.08598 (2021). https:\/\/arxiv.org\/pdf\/2102.08598.pdf ."},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2010.14"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2007.66"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"crossref","unstructured":"Luca Melis George Danezis and Emiliano De Cristofaro. 2016. Efficient Private Statistics with Succinct Sketches. (2016). Luca Melis George Danezis and Emiliano De Cristofaro. 2016. Efficient Private Statistics with Succinct Sketches. (2016).","DOI":"10.14722\/ndss.2016.23175"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382264"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.5555\/867576"},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49096-9_7"},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363204"},{"key":"e_1_3_2_2_66_1","unstructured":"Seth Neel Aaron Roth Giuseppe Vietri and Zhiwei Steven Wu. 2020. Oracle Efficient Private Non-Convex Optimization. (2020). https:\/\/proceedings.icml.cc\/static\/paper_files\/icml\/2020\/354-Paper.pdf . Seth Neel Aaron Roth Giuseppe Vietri and Zhiwei Steven Wu. 2020. Oracle Efficient Private Non-Convex Optimization. (2020). https:\/\/proceedings.icml.cc\/static\/paper_files\/icml\/2020\/354-Paper.pdf ."},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_40"},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818027"},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807247"},{"key":"e_1_3_2_2_70_1","volume-title":"USENIX Conference on Privacy Engineering Practice and Respect (PEPR).","author":"Rogers Ryan","year":"2020","unstructured":"Ryan Rogers . 2020 . A Differentially Private Data Analytics API at Scale . In USENIX Conference on Privacy Engineering Practice and Respect (PEPR). Ryan Rogers. 2020. A Differentially Private Data Analytics API at Scale. In USENIX Conference on Privacy Engineering Practice and Respect (PEPR)."},{"key":"e_1_3_2_2_71_1","volume-title":"Shraddha Sahay, and Parvez Ahammad.","author":"Rogers Ryan","year":"2020","unstructured":"Ryan Rogers , Subbu Subramaniam , Sean Peng , David Durfee , Seunghyun Lee , Santosh Kumar Kancha , Shraddha Sahay, and Parvez Ahammad. 2020 . LinkedIn's Audience Engagements API: A Privacy Preserving Data Analytics System at Scale . arXiv preprint arXiv:2002.05839 (2020). https:\/\/arxiv.org\/abs\/2002.05839. Ryan Rogers, Subbu Subramaniam, Sean Peng, David Durfee, Seunghyun Lee, Santosh Kumar Kancha, Shraddha Sahay, and Parvez Ahammad. 2020. LinkedIn's Audience Engagements API: A Privacy Preserving Data Analytics System at Scale. arXiv preprint arXiv:2002.05839 (2020). https:\/\/arxiv.org\/abs\/2002.05839."},{"key":"e_1_3_2_2_72_1","volume-title":"How to share a secret. Commun. ACM","author":"Shamir Adi","year":"1979","unstructured":"Adi Shamir . 1979. How to share a secret. Commun. ACM ( 1979 ). Adi Shamir. 1979. How to share a secret. Commun. ACM (1979)."},{"key":"e_1_3_2_2_73_1","volume-title":"Differentially Private Distributed Data Analysis. In IEEE International Conference on Collaboration and Internet Computing (CIC).","author":"Takabi Hassan","year":"2016","unstructured":"Hassan Takabi , Samir Koppikar , and Saman Taghavi Zargar . 2016 . Differentially Private Distributed Data Analysis. In IEEE International Conference on Collaboration and Internet Computing (CIC). Hassan Takabi, Samir Koppikar, and Saman Taghavi Zargar. 2016. Differentially Private Distributed Data Analysis. In IEEE International Conference on Collaboration and Internet Computing (CIC)."},{"key":"e_1_3_2_2_74_1","unstructured":"Apple's Differential Privacy Team. 2017. Learning with Privacy at scale. https:\/\/machinelearning.apple.com\/2017\/12\/06\/learning-with-privacy-at-scale.html. Apple's Differential Privacy Team. 2017. Learning with Privacy at scale. https:\/\/machinelearning.apple.com\/2017\/12\/06\/learning-with-privacy-at-scale.html."},{"key":"e_1_3_2_2_75_1","volume-title":"Retrieved","author":"Machine Learning Group ULB.","year":"2019","unstructured":"Machine Learning Group ULB. 2019 . Online Retail . Retrieved October, 2020 from https:\/\/archive.ics.uci.edu\/ml\/datasets\/Online+Retail+II https:\/\/archive.ics.uci.edu\/ml\/datasets\/Online+Retail+II. Machine Learning Group ULB. 2019. Online Retail. Retrieved October, 2020 from https:\/\/archive.ics.uci.edu\/ml\/datasets\/Online+Retail+II https:\/\/archive.ics.uci.edu\/ml\/datasets\/Online+Retail+II."},{"key":"e_1_3_2_2_76_1","volume-title":"Tutorials on the Foundations of Cryptography","author":"Vadhan Salil","unstructured":"Salil Vadhan . 2017. The complexity of differential privacy . In Tutorials on the Foundations of Cryptography . Springer . Salil Vadhan. 2017. The complexity of differential privacy. In Tutorials on the Foundations of Cryptography. Springer."},{"key":"e_1_3_2_2_77_1","volume-title":"USENIX Security Symposium (USENIXSec).","author":"Wang Tianhao","year":"2017","unstructured":"Tianhao Wang , Jeremiah Blocki , Ninghui Li , and Somesh Jha . 2017 . Locally differentially private protocols for frequency estimation . In USENIX Security Symposium (USENIXSec). Tianhao Wang, Jeremiah Blocki, Ninghui Li, and Somesh Jha. 2017. Locally differentially private protocols for frequency estimation. In USENIX Security Symposium (USENIXSec)."},{"key":"e_1_3_2_2_78_1","volume-title":"Locally differentially private heavy hitter identification","author":"Wang Tianhao","year":"2019","unstructured":"Tianhao Wang , Ninghui Li , and Somesh Jha . 2019. Locally differentially private heavy hitter identification . IEEE Transactions on Dependable and Secure Computing ( 2019 ). Tianhao Wang, Ninghui Li, and Somesh Jha. 2019. Locally differentially private heavy hitter identification. IEEE Transactions on Dependable and Secure Computing (2019)."},{"key":"e_1_3_2_2_79_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0025"},{"key":"e_1_3_2_2_80_1","volume-title":"Annual IEEE Symposium on Foundations of Computer Science (FOCS).","author":"Chi-Chih Yao Andrew","year":"1986","unstructured":"Andrew Chi-Chih Yao . 1986 . How to generate and exchange secrets . In Annual IEEE Symposium on Foundations of Computer Science (FOCS). Andrew Chi-Chih Yao. 1986. How to generate and exchange secrets. In Annual IEEE Symposium on Foundations of Computer Science (FOCS)."},{"key":"e_1_3_2_2_81_1","unstructured":"Wennan Zhu Peter Kairouz Brendan McMahan Haicheng Sun and Wei Li. 2020. Federated Heavy Hitters Discovery with Differential Privacy. In International Conference on Artificial Intelligence and Statistics (AISTATS ). http:\/\/proceedings.mlr.press\/v108\/zhu20a.html http:\/\/proceedings.mlr.press\/v108\/zhu20a\/zhu20a.pdf. Wennan Zhu Peter Kairouz Brendan McMahan Haicheng Sun and Wei Li. 2020. Federated Heavy Hitters Discovery with Differential Privacy. In International Conference on Artificial Intelligence and Statistics (AISTATS ). http:\/\/proceedings.mlr.press\/v108\/zhu20a.html http:\/\/proceedings.mlr.press\/v108\/zhu20a\/zhu20a.pdf."}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484557","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,8]],"date-time":"2023-01-08T01:32:11Z","timestamp":1673141531000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484557"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":81,"alternative-id":["10.1145\/3460120.3484557","10.1145\/3460120"],"URL":"http:\/\/dx.doi.org\/10.1145\/3460120.3484557","relation":{},"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}